Feeds

MS says so sorry to Sidekick users

Most promised data back, but some are already in court

Seven Steps to Software Security

Microsoft has apologised for the failure of servers managing data on Sidekick devices, and promised that most customers will get their data back by Saturday.

In an open letter Roz Ho, VP of Premium Mobile Experiences at Microsoft, apologises for the "recent problems". She then claims that "most, if not all" of the data has been recovered and will be restored to the servers over the next couple of days.

Since the beginning of October, Sidekick users have had problems retrieving their data, leading up to the complete failure of the cloud-based service. Customers were advised to switch their Sidekicks off to prevent synchronisation attempts.

The letter attributes the catastrophic disappearance of the service to a "system failure that created data loss in the core database and backup", and goes on to promise that "we are taking immediate steps to help ensure this does not happen again".

Systemic failure triggered by synchronised data corruption is less exciting than the various conspiracy stories floating around the net, but the idea that the problems are related to Microsoft's lack of interest in the Sidekick service probably has more than a grain of truth to it.

Certainly the various plaintiffs who've launched actions against T-Mobile and Microsoft believe the companies have been negligent in looking after customers' data:

"Defendants negligently failed to invest the resources, including hardware, software, procedures, maintenance, security, back up procedures, and the training and testing necessary", claims one of the class actions lodged in California (pdf).

If T-Mobile and Microsoft can really restore the data lost by every Sidekick customer then they may yet come out of this looking responsive, if not trustworthy. That won’t make the legal actions disappear, but it might restore some confidence in cloud services. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.